Search
Security and Compliance
Organizations are challenged to maintain compliance to regulatory standards and internal mandates while proactively keeping users and data secure. As the cyber landscape evolves and becomes more complex, it is imperative to have sufficient visibility into users and transactions that impact both compliance and security. Log data plays a significant role in providing that insight…
From Scalped Super Bowl Tickets to Fake Invoices at Microsoft
One employee can do a lot of damage. Just look at the headlines the other day from Microsoft. A grand jury indicted Microsoft’s former director of Sports Marketing and Alliances, Jeff Tran, for allegedly trying to create fake invoices for up to $1.4 million and scalping the company’s Super Bowl tickets for $200,000. Tran helped…
Time to Wake Up About the Inside Threat
Time to Wake Up About the Inside Threat The inside threat continues to grow at companies with various reports showing the insider is responsible for anywhere between 60% and 80% of breaches. Below are five stories about inside attacks that made the news in 2018: SunTrust Bank dealt with the internal threat earlier this year…
Cooking the Books Instead of Pastries
It’s like you become a little kid again when you walk into a café and take a look at the wide assortment of pastries and cakes behind the display cases. Eyes widen… stomachs growl… thoughts of calories go out the window. The last thing going through your mind is the accounting practices at the café…
When the Insider Threat Wants to Steal Your Trade Secrets
We’ve covered several recent stories in the news about employees creating fraudulent invoices, entering fictitious vendors or changing bank account details to enrich themselves. These stories all focused on an employee or contractor diverting funds to themselves. But there’s another tactic that the inside threat can take that has even more devastating consequences to the…
Uncovering the Biggest Security Threats by Analyzing User Behavior
By Jasmine Chennikara-Varghese The biggest security threats are already inside your cyber landscape. Inside users silently navigate through your applications and databases, possibly exposing data through accidental misuse, compromised credentials or malicious intent. However, security teams prioritize monitoring and searching for attacks and intrusions coming from outside. Insider threat is usually considered mitigated with protections…
Insider Threat in the Cloud
By Jasmine Chennikara-Varghese As applications and the sensitive data they contain migrate to the cloud, the risks linked to insider threat persist. Cloud services empower end users to be more mobile, flexible and productive while also simplifying IT management and improving cost-efficiency. However, the cloud also expands the attack surfaces, enabling exploits and exposing vulnerabilities…
Key Highlights from the Verizon Data Breach Investigation Report 2019
by Jasmine Chennikara-Varghese This year’s Verizon Data Breach Investigation Report (DBIR) analyzes the current threat landscape and provides insights for improving cyber defenses. The 2019 DBIR is based on data gathered from more than 40,000 cybersecurity incidents and over 2,000 confirmed data breaches across 86 countries. The real world data in the DBIR reinforces that…
Shall we play a game?
It’s that famous line delivered by Joshua (a.k.a. WOPR, or War Operation Plan Response) to Matthew Broderick in the movie WarGames from 1983. It’s been a long time since that movie first came out, so here’s a quick refresher – Broderick thinks he’s hacking into a software developer and gains access to a host of…